Special Modes - Part I

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW1m 2s
File Attributes
ACLs
9
ACLs
9m 25s
10
ACLs Demo
6m 13s
Rootkits
11
Rootkits
8m 33s

The course is part of this learning path

Start course
Overview
Difficulty
Intermediate
Duration
1h 13m
Students
72
Ratings
5/5
starstarstarstarstar
Description

This course covers the security features that you can use in order to secure your files and directories on Linux. We look at permissions, data sharing, special modes, file attributes, ACLs, and rootkits. You will also have the chance to follow along with guided demonstrations which will give you a practical understanding of the concepts covered.

Learning Objectives

  • Learn how Linux file and directory permissions work and how to apply the proper permissions to files and directories
  • Learn how to share data securely with groups and multiple users on a Linux system
  • Understand how special modes add extra security to file systems
  • Learn how to make files unchangeable even by the root user and how to secure the log files on a Linux system by making them append-only
  • Learn how to secure files and directories using ACLs
  • Learn about rootkits and how to discover and remove them

Intended Audience

This course is intended for anyone who wants to understand how to secure their Linux systems.

Prerequisites

To get the most out of this course, you should already have a good working knowledge of Linux. If you want to brush up on your Linux skills, consider taking our Learn Linux in 5 Days learning path first.

Transcript

Let's take a couple of Minutes to talk about the special modes of setuid, setgid and the sticky bit. When you start a process, it starts running with your user and group permissions. We've talked about ways to run programs as others including using the sudo and su command. However, there was a special permission you can use called setuid. It stands for set userID and it forces a process to start as the owner of the file, regardless of who executes that file. To tell if a file has the setuid bit set, you can look at its LS output. You will see an S in the execute field of the owner section of the permissions. The password program is one such file that has the setuid permission. Since the owner of the file is route, when this program gets executed, it runs as the route user. The reason the password command uses setuid route, is because it needs root privileges to modify the Etsy password and or the Etsy shadow files, when a user changes their password. The ping command is another example of setuid route permissions. The ping command needs a route privileges to access network devices. Setting the setuid bit and having route as the owner of the file, lets anyone on the system successfully use the ping command. The chsh command is yet another example. This command allows the user to change their shell. Doing so requires an update to the Etsy password file which can only be edited by the root user. Once an attacker gains access to a system they often look for files that are setuid route. Since these files run as route they are an attack surface for privilege escalation attacks. It's important to note that most Linux distributions do not honor setuid on shell scripts only on binary files. If you were to execute a shell script that has the setuid attributes set, it would execute as you. Said another way, it will execute as the user who runs the script. This is a security measure taken by the OS. Just like you can determine the numeric permissions to use with marred by adding together the base 10 values of read, write and execute, you can add together the permissions of setuid, setgid and the sticky bit to get the desired special permissions. The base 10 value of setuid is four, setgid is two and the sticky bit is one. Just like any other file permissions, you can add the setuid attribute to a file using the chmod command. To do so in symbolic notation run chmod, u plus s and then supply the path to the file. To add the setuid Attribute using octal or numeric notation, start the permissions with a four, then follow it with the normal permissions mode. For example, you could run chmod four seven five five, to turn on the setuid attribute, allow the owner of the file full permissions and everyone else the ability to read and execute the file. To remove the setuid permission run chmod u dash s or chmod starting with a zero followed by the desired numeric mode. To find all the files on the system that have the setuid permission set, you can use the find command. Run find slash which means start searching from the root of the file system, then use the dash perm option followed by a forward slash and then 4,000. The forward slash means to match any of the permission bits that are set for the file. If you're using an older version of find you might need to run dash perm plus 4,000. You can also add the dash LS option to find which displays the results in a long listing format, so you can view the permissions. What you're looking for is files that can be edited by any other user other than the owner of that file. Using a four, seven, five, five mode on a file, allows the owner of the file to edit it. Using four, seven, seven, five gives editing permissions to members of the group to which that file belongs. Using four, seven, seven, seven allows anyone to edit the file. This would be extremely bad especially if the file is owned by route. This would allow someone to change the contents of that file to do whatever they want. When they execute that file, it will run with root privileges. This is something that an attacker hopes to find when they gain access to your system. If they broke in with a normal user account they are looking to escalate their privileges to the super user account so that they can do anything they want with the system. setgid is very much like setuid. It causes the program to run with the group privileges of the file rather than the group privileges of the person executing the file. To tell if a file has the setgid bit set you can look at its Ls output. You will see an s in the execute field of the group section of the permissions. One example of a command that has setgid is the wall command. The wall command displays a message to the terminal of users that are logged into the system. Since all the files that represent a user's terminal are in the TTY group, and the TTY group has write permission on those files, anyone using the wall command is allowed to write to those terminals, because that process is running with TTY group privileges. To find all the files on the system that have the setgid bit permission set, run find slash dash perm forward slash 2000. Again, the forward slash means to match any of the permission bits that are set for the file. If you are using an older version of find you might need to use dash perm plus 2000. If you want to get a long LS listing output of all the files that match those permission sets, use the dash LS option. To add that setgid permission to a file use chmod g plus s or use a two in the first field of the permission string. For example, you could run to chmod two, seven, five, five on a file to turn on the setgid attribute, allow the owner of the file full permissions and everyone else the ability to read and execute the file. If you want to add both as setuid and setgid permissions, you can run chmod u g plus s or chmod six followed by the normal permissions. Since setuid is represented by four and setgid is represented by two, you can add them together to get six and use that in the special permissions field. To remove the setgid permission use chmod g minus s. You can also subtract two from the special permissions field. To clear all special permissions use chmod zero followed by the normal desired mode. Using setgid on a directory causes new files and sub-directories created within it to inherit the groupID of that directory rather than the group ID of the user creating the new file of a directory. Also newly created directories inherit the setgid bit. So, again all the new files and directories created within that new directory inherit the groupID of that directory as well. Note that setting the setgid permission on a directory only affects the groupID of new files, and sub-directories created after the setgid bit is set. Adding the setgid bit to an existing directory, does not change the permissions of existing files and sub-directories. Using the setgid bit on directories can make it easier when working with groups. If you want to make sure all the files are created with a proper group ownership and a shared location, turn on the setgid bit for that directory. This way you don't have to worry about a user forgetting to run the newgrp command before creating a file or forgetting to change the group ownership of a file that they created.

About the Author
Avatar
Jason Cannon
Founder, Linux Training Academy
Students
4195
Courses
61
Learning Paths
8

Jason is the founder of the Linux Training Academy as well as the author of "Linux for Beginners" and "Command Line Kung Fu." He has over 20 years of professional Linux experience, having worked for industry leaders such as Hewlett-Packard, Xerox, UPS, FireEye, and Amazon.com. Nothing gives him more satisfaction than knowing he has helped thousands of IT professionals level up their careers through his many books and courses.